Sciweavers

2269 search results - page 56 / 454
» Behavioral Intrusion Detection
Sort
View
SDM
2003
SIAM
124views Data Mining» more  SDM 2003»
15 years 1 months ago
A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection
Aleksandar Lazarevic, Levent Ertöz, Vipin Kum...
CORR
2010
Springer
119views Education» more  CORR 2010»
15 years 20 days ago
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems
Julie Greensmith, Uwe Aickelin, Jamie Twycross
FEGC
2009
94views Biometrics» more  FEGC 2009»
14 years 10 months ago
Online and adaptive anomaly Detection: detecting intrusions in unlabelled audit data streams
Wei Wang 0012, Thomas Guyet, Rene Quiniou, Marie-O...
FPL
2005
Springer
138views Hardware» more  FPL 2005»
15 years 6 months ago
Snort Offloader: A Reconfigurable Hardware NIDS Filter
Software-based Network Intrusion Detection Systems (NIDS) often fail to keep up with high-speed network links. In this paper an FPGA-based pre-filter is presented that reduces th...
Haoyu Song, Todd S. Sproull, Michael Attig, John W...
107
Voted
KDD
2006
ACM
156views Data Mining» more  KDD 2006»
16 years 29 days ago
Detecting outliers using transduction and statistical testing
Outlier detection can uncover malicious behavior in fields like intrusion detection and fraud analysis. Although there has been a significant amount of work in outlier detection, ...
Daniel Barbará, Carlotta Domeniconi, James ...